Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Child sexual abuse (2)
- Child testimony (2)
- Putative confession (2)
- Atkins v. Virginia (536 U.S. 304 (2002)) (1)
- Boyd v. United States (1)
-
- Capital Punishment (1)
- Child Abuse (1)
- Child Neglect (1)
- Child Sexual Abuse (1)
- Child Testimony (1)
- Child Witness (1)
- Child abuse (1)
- Child credibility (1)
- Children's Memory (1)
- Compulsory production (1)
- Cruel and Unusual Punishment (1)
- Cryptographic keys (1)
- Cryptography (1)
- Deception detection (1)
- Decryption (1)
- Derivative use immunity (1)
- Fifth Amendment (1)
- Florida (1)
- Fourth Amendment (1)
- Hall v. Florida (134 S. Ct. 1986 (2014)) (1)
- Implicit encouragement (1)
- Interviewing children (1)
- Mentally Disabled Persons (1)
- Minor Transgressions (1)
- Privacy (1)
- Publication
Articles 1 - 5 of 5
Full-Text Articles in Evidence
64. Effects Of The Putative Confession Instruction On Perceptions Of Children’S True And False Statements, Jennifer Gongola, Nicholas Scurich, Thomas D. Lyon
64. Effects Of The Putative Confession Instruction On Perceptions Of Children’S True And False Statements, Jennifer Gongola, Nicholas Scurich, Thomas D. Lyon
Thomas D. Lyon
63. Children’S Conversational Memory Regarding A Minor Transgression And A Subsequent Interview., Stacia N. Stolzenberg, Kelly Mcwilliams, Thomas D. Lyon
63. Children’S Conversational Memory Regarding A Minor Transgression And A Subsequent Interview., Stacia N. Stolzenberg, Kelly Mcwilliams, Thomas D. Lyon
Thomas D. Lyon
62. The Effects Of Implicit Encouragement And The Putative Confession On Children’S Memory Reports., Kyndra C. Cleveland, Jodi A. Quas, Thomas D. Lyon
62. The Effects Of Implicit Encouragement And The Putative Confession On Children’S Memory Reports., Kyndra C. Cleveland, Jodi A. Quas, Thomas D. Lyon
Thomas D. Lyon
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
Hall V. Florida: The Supreme Court’S Guidance In Implementing Atkins, James W. Ellis
Hall V. Florida: The Supreme Court’S Guidance In Implementing Atkins, James W. Ellis
James W. Ellis
No abstract provided.